Thursday, April 2, 2026

Turning off Windows spy on your applications and clipboard - Windows TimeLine & Activity History


What Windows Timeline / Activity History? 

Its primary purpose is to store a chronological record of a user's activities on a device, allowing you to "pick up where you left off" across different sessions or even different devices synced to the same Microsoft account.


The database tracks "Activities," which Windows defines as specific interactions with applications or content. This includes:
  • Application Usage: Which apps were opened and for how long.
  • File Access: Specific documents, images, or folders you interacted with.
  • Web Browsing: Pages visited (primarily via Microsoft Edge).
  • Cross-Device Syncing: If enabled, it stores data from other Windows devices signed into the same account.

This file lives under:

%LOCALAPPDATA%\ConnectedDevicesPlatform\{GUID}\ActivitiesCache.db

It is the SQLite database used by Windows Timeline & Activity History. You can view the db file using this free tool DB Browser for SQLite (sqlitebrowser.org). It's not encrypted. See below for meaningful query. Windows writes to it whenever:

  • Activity History is enabled

  • Cloud sync is enabled

  • Certain shell events occur (app launches, document usage, etc.)

Even if you never use Timeline, Windows 10/11 still tries to write to it unless the feature is fully disabled. It's hard to turn off.


How to Stop Windows from Writing to ActivitiesCache.db

Here’s the important part: There is no supported registry key that directly disables the database itself. But you can disable every subsystem that feeds it, which effectively stops writes.

Below is the forensically correct way to shut it down.


✅1. Disable Activity History (User Setting)

Go to:

Settings → Privacy → Activity history

Turn off:

  • Store my activity history on this device

  • Send my activity history to Microsoft

Then click Clear activity history.

This stops the user-mode Activity History pipeline.


✅ 2. Disable Activity History via Group Policy (Stronger)

For Windows 10/11 Pro/Enterprise:

gpedit.msc

Navigate to:

Computer Configuration → Administrative Templates → System → OS Policies

Enable:

  • Allow publishing of User ActivitiesDisabled

  • Allow upload of User ActivitiesDisabled

This blocks the Activity Feed service from writing new rows.



✅ 3. Disable Connected Devices Platform (CDP) Services

These services feed the ActivitiesCache pipeline:

  • Connected Devices Platform Service (CDPSvc)

  • Connected Devices Platform User Service_XXXX

  • Clipboard User Service_XXXX

Clipboard User Service Core Functions
  1. Clipboard History: It allows you to store multiple items in your clipboard (accessed via Win + V) instead of just the most recent one.
  2. Cloud Synchronization: It enables the "Sync across devices" feature, allowing you to copy text or images on one PC and paste them onto another linked device.
  3. Data Formatting: It handles the background processing required to ensure that different types of data (plain text, HTML, images) are correctly formatted when pasted into different applications. NOTE: I have test this copying a HTML file to Word document using a Clipboard Spy and all formats appear.
You can disable them:

services.msc

Set both to:

  • Startup type: Disabled

  • Stop the service

⚠️ Note: Some Bluetooth and cross-device features depend on CDP. But for forensic lockdown, this is the most effective method.



You must delete the service in Registry, but it gets recreated under a new random number. Using command line or Task Scheduler gives the "Incorrect Parameter error."


Can You Disable CDPUserSvc via Registry?

Yes — but with caveats. Open WinKey+R -> Regedit

You can disable the template service:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CDPUserSvc
  Start = 4   (Disabled)

However:

  • Windows may still create the per‑user instance key

  • The instance will inherit Start=4 and will not run

  • This is functionally equivalent to disabling it in services.msc

This aligns with guidance that CDPSvc/CDPUserSvc can be disabled if not needed.

NOTE! If you disable the template (Start=4):
  • Windows still creates CDPUserSvc_<RANDOM>

  • But the instance never starts

  • No CDP activity is generated

  • ActivitiesCache.db stops receiving CDP‑originated events

  • The DB may still be created as a placeholder, but remains static

This matches your goal of stopping writes to ActivitiesCache.db.

✅ 4. Block the Scheduled Tasks That Feed It

Disable these tasks:

Task Scheduler → Microsoft → Windows → Shell
  • FamilySafetyMonitor

  • FamilySafetyRefresh

  • ShellExperienceHost

  • Windows Error Reporting → QueueReporting

These tasks generate Activity History events.

✅ 5. Forensic Verification

Since you’re a Windows internals forensic specialist, here’s the deterministic check:

After disabling everything:

  1. Delete or rename the existing DB:

    ActivitiesCache.db → ActivitiesCache.db.disabled
  2. Reboot.

  3. Observe whether a new DB is created.

If all policies + services are disabled, Windows will not recreate the DB. If it does reappear, something is still feeding the pipeline.

What Doesn’t Work

These myths float around, but they do not stop writes:

MethodWhy it fails
Setting file ACL to deny writesWindows retries endlessly; CDP logs errors; DB may be recreated elsewhere
Deleting the DB onlyWindows recreates it immediately
Disabling “Let Windows collect my activities” aloneCDP still writes local events
Registry hacks from old blogsMost are ignored in Win10 1809+


Querying ActivitiesCache.db

SELECT
    Id,
    AppId,
    AppActivityId,
    CASE
        WHEN AppId LIKE 'win32_%' THEN SUBSTR(AppId, 7)
        WHEN AppId LIKE 'Microsoft.Windows.%' THEN 'Windows Store App'
        WHEN AppId LIKE '%exe%' THEN REPLACE(AppId, 'win32_', '')
        ELSE AppId
    END as ApplicationName,
    ActivityType,
    CASE ActivityType
        WHEN 1 THEN 'Application Launch'
        WHEN 2 THEN 'Application Focus'
        WHEN 3 THEN 'Application Close'
        WHEN 4 THEN 'File Open'
        WHEN 5 THEN 'Web Browse'
        ELSE 'Unknown'
    END as ActivityTypeName,
    datetime(StartTime / 10000000 - 62135596800, 'unixepoch', 'localtime') as StartDateTime,
    datetime(EndTime / 10000000 - 62135596800, 'unixepoch', 'localtime') as EndDateTime,
    datetime(LastModifiedTime / 10000000 - 62135596800, 'unixepoch', 'localtime') as LastModified,
    CAST((EndTime - StartTime) / 10000000.0 AS REAL) as DurationSeconds,
    Payload,
    json_extract(Payload, '$.DisplayText') as DisplayName,
    json_extract(Payload, '$.Description') as WindowTitle,
    json_extract(Payload, '$.ContentUri') as FilePath,
    json_extract(Payload, '$.AppInfo.DisplayName') as AppDisplayName,
    "Group",
    MatchId,
    CASE
        WHEN ActivityStatus = 0 THEN 'Active'
        WHEN ActivityStatus = 1 THEN 'Inactive'
        ELSE 'Unknown'
    END as ActivityStatus,
    PlatformDeviceId,
    CreatedInCloud,
    Priority,
    IsLocalOnly,
    UserActionState,
    IsRead
FROM Activity
WHERE ActivityType IN (1, 2, 3, 4, 5)  -- Application related activities
    AND AppId IS NOT NULL
ORDER BY StartTime DESC;

Results

=H��VJZ JY8` [{"application":"{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\\VideoLAN\\VLC\\vlc.exe","platform":"windows_win32"},{"application":"{6D809377-6AF0-444B-8957-A3773F02200E}\\VideoLAN\\VLC\\vlc.exe","platform":"windows_win32"},{"application":"{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\\VideoLAN\\VLC\\vlc.exe","platform":"packageId"},{"application":"","platform":"alternateId"}] ECB32AF3-1440-4086-94E3-5311F97F89C4 [{"application":"{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\\VideoLAN\\VLC\\vlc.exe","platform":"windows_win32"},{"application":"{6D809377-6AF0-444B-8957-A3773F02200E}\\VideoLAN\\VLC\\vlc.exe","platform":"windows_win32"},{"application":"{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\\VideoLAN\\VLC\\vlc.exe","platform":"packageId"},{"application":"","platform":"alternateId"}] 5 Web Browse 0000-12-31 19:02:57 0000-12-31 19:00:00 0000-12-31 19:02:57 -177.4757047 {"displayText":"VLC media player","activationUri":"ms-shellactivity:","appDisplayName":"VLC media player","backgroundColor":"black"} Unknown tdHHca9QssN0pKMtrZhm/e99sW2pw/4ggLkB7aOlFFE= 0 3 0 0 0





Wednesday, April 1, 2026

Google Cloud Phishing Email with subject RE: Your cloud storage is full. Act now or lose everything


For the record, this is a Google Cloud 
phishing email attempt that is recently going around, with subject RE: Your cloud storage is full. Act now or lose everything

What to do?  
Report them, goto bottom of page. 


From: Cloud Account deletion notification <atamaria.ibwza@manageeye1234.tigergeneratorth.com>

Subject: RE: Your cloud storage is full. Act now or lose everything



Google Cloud Notification Center

Dear User,

We have detected that your Google Cloud Storage service requires action to prevent the permanent loss of your digital content.

Risk of Personal Content Deletion Your storage plan expires today. Renew it to keep your data safe.

Google Cloud Storage automatically syncs photos, videos, personal files, and work documents across all devices linked to your Google account.

ACCOUNT DETAILS

Account Number3333334444
Active PlanGoogle Cloud Storage
Valid UntilTODAY

Without renewal, synchronization will be automatically disabled, and recovery of your stored content will no longer be possible.

[Upgrade Google Cloud Storage] (blue button)

Automated Message: This notification was generated by the system. Replies to this address are not possible.







PHISHING LINKs;

1. http://xn--h2t5rh2t5rh2t5r-hqb4x77c.mozinfo.com/xxx...


How to tell this is a Phishing email?

  1. Check email address in full, if it's not from originating company then it's phishing.
  2. Hover over all links in email, if it's not from the company's website then forget it.
  3. The best way is to 

How to examine Email Message Source?

Now let's look at message source
  1. Outlook.com->Actions->View Message Source. 
  2. Gmail.com->More (down arrow to top right)->Show original.
Check for suspicious links, anything that does not originate from source domain, like apple.com.


Report Phishing Email (not as Spam)

  1. Outlook.com->Junk (at Top)->Phishing Scam
  2. Gmail.com->More (down-arrow to top right)->Report Phishing 

Report Phishing to Google

If you have received this email, take further action by

  1. https://www.google.com/safebrowsing/report_phish/

Report phishing at Microsoft and government agencies

  1. http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Friday, March 27, 2026

Create a Rogers Communications Inc. compliant password


 Rogers Password Generator

Create strong, secure passwords with customizable options. Defaults complaint with Rogers Communications Inc. password requirements.

Your password will appear here

Password Length

8 64 =>
26

Character Options

Security Options - Case Insensitive

Password Strength: -